- 1.79.0 (latest)
 - 1.77.0
 - 1.76.0
 - 1.75.0
 - 1.74.0
 - 1.73.0
 - 1.71.0
 - 1.69.0
 - 1.68.0
 - 1.65.0
 - 1.64.0
 - 1.63.0
 - 1.61.0
 - 1.60.0
 - 1.59.0
 - 1.58.0
 - 1.57.0
 - 1.56.0
 - 1.55.0
 - 1.54.0
 - 1.53.0
 - 1.52.0
 - 1.50.0
 - 1.49.0
 - 1.48.0
 - 1.47.0
 - 1.46.0
 - 1.45.0
 - 1.44.0
 - 1.43.0
 - 1.42.0
 - 1.41.0
 - 1.40.0
 - 1.38.0
 - 1.37.0
 - 1.36.0
 - 1.35.0
 - 1.34.0
 - 1.33.0
 - 1.32.0
 - 1.31.0
 - 1.30.0
 - 1.29.0
 - 1.28.0
 - 1.25.0
 - 1.24.0
 - 1.23.0
 - 1.22.0
 - 1.21.0
 - 1.20.0
 - 1.19.0
 - 1.18.0
 - 1.17.0
 - 1.16.0
 - 1.15.0
 - 1.14.0
 - 1.13.0
 - 1.12.0
 - 1.10.0
 - 1.9.0
 - 1.8.0
 - 1.7.0
 - 1.6.0
 - 1.5.0
 - 1.1.10
 
public enum DropInfo.Cause extends Enum<DropInfo.Cause> implements ProtocolMessageEnumDrop cause types:
 Protobuf enum google.cloud.networkmanagement.v1beta1.DropInfo.Cause
Implements
ProtocolMessageEnumStatic Fields | 
      |
|---|---|
| Name | Description | 
BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED | 
        Packet is dropped due to a backend service named port not being defined on the instance group level.    | 
      
BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED_VALUE | 
        Packet is dropped due to a backend service named port not being defined on the instance group level.    | 
      
CAUSE_UNSPECIFIED | 
        Cause is unspecified.    | 
      
CAUSE_UNSPECIFIED_VALUE | 
        Cause is unspecified.    | 
      
CLOUD_FUNCTION_NOT_ACTIVE | 
        Packet could be dropped because the Cloud Function is not in an active status.    | 
      
CLOUD_FUNCTION_NOT_ACTIVE_VALUE | 
        Packet could be dropped because the Cloud Function is not in an active status.    | 
      
CLOUD_NAT_NO_ADDRESSES | 
        Packet sent to Cloud Nat without active NAT IPs.    | 
      
CLOUD_NAT_NO_ADDRESSES_VALUE | 
        Packet sent to Cloud Nat without active NAT IPs.    | 
      
CLOUD_RUN_REVISION_NOT_READY | 
        Packet sent from a Cloud Run revision that is not ready.    | 
      
CLOUD_RUN_REVISION_NOT_READY_VALUE | 
        Packet sent from a Cloud Run revision that is not ready.    | 
      
CLOUD_SQL_CONNECTOR_REQUIRED | 
        Packet was dropped because the Cloud SQL instance requires all connections to use Cloud SQL connectors and to target the Cloud SQL proxy port (3307).    | 
      
CLOUD_SQL_CONNECTOR_REQUIRED_VALUE | 
        Packet was dropped because the Cloud SQL instance requires all connections to use Cloud SQL connectors and to target the Cloud SQL proxy port (3307).    | 
      
CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC | 
        Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.    | 
      
CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC_VALUE | 
        Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.    | 
      
CLOUD_SQL_INSTANCE_NOT_RUNNING | 
        Packet sent from or to a Cloud SQL instance that is not in running state.    | 
      
CLOUD_SQL_INSTANCE_NOT_RUNNING_VALUE | 
        Packet sent from or to a Cloud SQL instance that is not in running state.    | 
      
CLOUD_SQL_INSTANCE_NO_IP_ADDRESS | 
        Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.    | 
      
CLOUD_SQL_INSTANCE_NO_IP_ADDRESS_VALUE | 
        Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.    | 
      
CLOUD_SQL_INSTANCE_NO_ROUTE | 
        Packet was dropped because there is no route from a Cloud SQL instance to a destination network.    | 
      
CLOUD_SQL_INSTANCE_NO_ROUTE_VALUE | 
        Packet was dropped because there is no route from a Cloud SQL instance to a destination network.    | 
      
CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS | 
        Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.    | 
      
CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS_VALUE | 
        Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.    | 
      
CLOUD_SQL_PSC_NEG_UNSUPPORTED | 
        The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.    | 
      
CLOUD_SQL_PSC_NEG_UNSUPPORTED_VALUE | 
        The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.    | 
      
DESTINATION_IS_PRIVATE_NAT_IP_RANGE | 
        Packet is dropped due to a destination IP range being part of a Private NAT IP range.    | 
      
DESTINATION_IS_PRIVATE_NAT_IP_RANGE_VALUE | 
        Packet is dropped due to a destination IP range being part of a Private NAT IP range.    | 
      
DROPPED_INSIDE_CLOUD_SQL_SERVICE | 
        Packet was dropped inside Cloud SQL Service.    | 
      
DROPPED_INSIDE_CLOUD_SQL_SERVICE_VALUE | 
        Packet was dropped inside Cloud SQL Service.    | 
      
DROPPED_INSIDE_GKE_SERVICE | 
        Packet was dropped inside Google Kubernetes Engine Service.    | 
      
DROPPED_INSIDE_GKE_SERVICE_VALUE | 
        Packet was dropped inside Google Kubernetes Engine Service.    | 
      
DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE | 
        Packet is dropped inside a Google-managed service due to being delivered in return trace to an endpoint that doesn't match the endpoint the packet was sent from in forward trace. Used only for return traces.    | 
      
DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE_VALUE | 
        Packet is dropped inside a Google-managed service due to being delivered in return trace to an endpoint that doesn't match the endpoint the packet was sent from in forward trace. Used only for return traces.    | 
      
DROPPED_INSIDE_PSC_SERVICE_PRODUCER | 
        Packet was dropped inside Private Service Connect service producer.    | 
      
DROPPED_INSIDE_PSC_SERVICE_PRODUCER_VALUE | 
        Packet was dropped inside Private Service Connect service producer.    | 
      
DROPPED_INSIDE_REDIS_CLUSTER_SERVICE | 
        Generic drop cause for a packet being dropped inside a Redis Cluster service project.    | 
      
DROPPED_INSIDE_REDIS_CLUSTER_SERVICE_VALUE | 
        Generic drop cause for a packet being dropped inside a Redis Cluster service project.    | 
      
DROPPED_INSIDE_REDIS_INSTANCE_SERVICE | 
        Generic drop cause for a packet being dropped inside a Redis Instance service project.    | 
      
DROPPED_INSIDE_REDIS_INSTANCE_SERVICE_VALUE | 
        Generic drop cause for a packet being dropped inside a Redis Instance service project.    | 
      
FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK | 
        Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.    | 
      
FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK_VALUE | 
        Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.    | 
      
FIREWALL_RULE | 
        Dropped due to a firewall rule, unless allowed due to connection tracking.    | 
      
FIREWALL_RULE_VALUE | 
        Dropped due to a firewall rule, unless allowed due to connection tracking.    | 
      
FOREIGN_IP_DISALLOWED | 
        A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.    | 
      
FOREIGN_IP_DISALLOWED_VALUE | 
        A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.    | 
      
FORWARDING_RULE_MISMATCH | 
        Forwarding rule's protocol and ports do not match the packet header.    | 
      
FORWARDING_RULE_MISMATCH_VALUE | 
        Forwarding rule's protocol and ports do not match the packet header.    | 
      
FORWARDING_RULE_NO_INSTANCES | 
        Forwarding rule does not have backends configured.    | 
      
FORWARDING_RULE_NO_INSTANCES_VALUE | 
        Forwarding rule does not have backends configured.    | 
      
FORWARDING_RULE_REGION_MISMATCH | 
        Packet could be dropped because it was sent from a different region to a regional forwarding without global access.    | 
      
FORWARDING_RULE_REGION_MISMATCH_VALUE | 
        Packet could be dropped because it was sent from a different region to a regional forwarding without global access.    | 
      
GKE_CLUSTER_NOT_RUNNING | 
        Packet sent from or to a GKE cluster that is not in running state.    | 
      
GKE_CLUSTER_NOT_RUNNING_VALUE | 
        Packet sent from or to a GKE cluster that is not in running state.    | 
      
GKE_CONTROL_PLANE_NO_ROUTE | 
        Packet was dropped because there is no route from a GKE cluster control plane to a destination network.    | 
      
GKE_CONTROL_PLANE_NO_ROUTE_VALUE | 
        Packet was dropped because there is no route from a GKE cluster control plane to a destination network.    | 
      
GKE_CONTROL_PLANE_REGION_MISMATCH | 
        Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.    | 
      
GKE_CONTROL_PLANE_REGION_MISMATCH_VALUE | 
        Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.    | 
      
GKE_MASTER_UNAUTHORIZED_ACCESS | 
        Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.    | 
      
GKE_MASTER_UNAUTHORIZED_ACCESS_VALUE | 
        Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.    | 
      
GKE_PSC_ENDPOINT_MISSING | 
        Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.    | 
      
GKE_PSC_ENDPOINT_MISSING_VALUE | 
        Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.    | 
      
GOOGLE_MANAGED_SERVICE_NO_PEERING | 
        Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.    | 
      
GOOGLE_MANAGED_SERVICE_NO_PEERING_VALUE | 
        Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.    | 
      
GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT | 
        Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.    | 
      
GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT_VALUE | 
        Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.    | 
      
HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED | 
        The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.    | 
      
HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED_VALUE | 
        The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.    | 
      
HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED | 
        The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.    | 
      
HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED_VALUE | 
        The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.    | 
      
INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS | 
        Matching ingress firewall rules by network tags for packets sent via serverless VPC direct egress is unsupported. Behavior is undefined. https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations    | 
      
INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS_VALUE | 
        Matching ingress firewall rules by network tags for packets sent via serverless VPC direct egress is unsupported. Behavior is undefined. https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations    | 
      
INSTANCE_NOT_RUNNING | 
        Packet is sent from or to a Compute Engine instance that is not in a running state.    | 
      
INSTANCE_NOT_RUNNING_VALUE | 
        Packet is sent from or to a Compute Engine instance that is not in a running state.    | 
      
LOAD_BALANCER_BACKEND_INVALID_NETWORK | 
        Packet is dropped due to a load balancer backend instance not having a network interface in the network expected by the load balancer.    | 
      
LOAD_BALANCER_BACKEND_INVALID_NETWORK_VALUE | 
        Packet is dropped due to a load balancer backend instance not having a network interface in the network expected by the load balancer.    | 
      
LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH | 
        Packet is dropped due to being sent to a backend of a passthrough load balancer that doesn't use the same IP version as the frontend.    | 
      
LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH_VALUE | 
        Packet is dropped due to being sent to a backend of a passthrough load balancer that doesn't use the same IP version as the frontend.    | 
      
LOAD_BALANCER_HAS_NO_PROXY_SUBNET | 
        Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.    | 
      
LOAD_BALANCER_HAS_NO_PROXY_SUBNET_VALUE | 
        Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.    | 
      
NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION | 
        Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix advertised via BGP by the Cloud Router.    | 
      
NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION_VALUE | 
        Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix advertised via BGP by the Cloud Router.    | 
      
NO_EXTERNAL_ADDRESS | 
        Endpoint with only an internal IP address tries to access external hosts, but there is no matching Cloud NAT gateway in the subnet.    | 
      
NO_EXTERNAL_ADDRESS_VALUE | 
        Endpoint with only an internal IP address tries to access external hosts, but there is no matching Cloud NAT gateway in the subnet.    | 
      
NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION | 
        Packet from the unknown NCC network is dropped due to no known route from the source network to the destination IP address.    | 
      
NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION_VALUE | 
        Packet from the unknown NCC network is dropped due to no known route from the source network to the destination IP address.    | 
      
NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION | 
        Packet from the unknown peered network is dropped due to no known route from the source network to the destination IP address.    | 
      
NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION_VALUE | 
        Packet from the unknown peered network is dropped due to no known route from the source network to the destination IP address.    | 
      
NO_MATCHING_NAT64_GATEWAY | 
        Packet with destination IP address within the reserved NAT64 range is dropped due to no matching NAT gateway in the subnet.    | 
      
NO_MATCHING_NAT64_GATEWAY_VALUE | 
        Packet with destination IP address within the reserved NAT64 range is dropped due to no matching NAT gateway in the subnet.    | 
      
NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT | 
        No NAT subnets are defined for the PSC service attachment.    | 
      
NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT_VALUE | 
        No NAT subnets are defined for the PSC service attachment.    | 
      
NO_ROUTE | 
        Dropped due to no matching routes.    | 
      
NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS | 
        Packet is sent from the external IPv6 source address of an instance to the private IPv6 address of an instance.    | 
      
NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS_VALUE | 
        Packet is sent from the external IPv6 source address of an instance to the private IPv6 address of an instance.    | 
      
NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS | 
        Packet is sent from the Internet or Google service to the private IPv6 address.    | 
      
NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS_VALUE | 
        Packet is sent from the Internet or Google service to the private IPv6 address.    | 
      
NO_ROUTE_VALUE | 
        Dropped due to no matching routes.    | 
      
NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION | 
        Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix included to the local traffic selector of the VPN tunnel.    | 
      
NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION_VALUE | 
        Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix included to the local traffic selector of the VPN tunnel.    | 
      
PRIVATE_GOOGLE_ACCESS_DISALLOWED | 
        Endpoint with only an internal IP address tries to access Google API and services, but Private Google Access is not enabled in the subnet or is not applicable.    | 
      
PRIVATE_GOOGLE_ACCESS_DISALLOWED_VALUE | 
        Endpoint with only an internal IP address tries to access Google API and services, but Private Google Access is not enabled in the subnet or is not applicable.    | 
      
PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED | 
        Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.    | 
      
PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED_VALUE | 
        Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.    | 
      
PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED | 
        Sending packets processed by the Private NAT Gateways to the Private Service Connect endpoints is not supported.    | 
      
PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED_VALUE | 
        Sending packets processed by the Private NAT Gateways to the Private Service Connect endpoints is not supported.    | 
      
PRIVATE_TRAFFIC_TO_INTERNET | 
        Packet with internal destination address sent to the internet gateway.    | 
      
PRIVATE_TRAFFIC_TO_INTERNET_VALUE | 
        Packet with internal destination address sent to the internet gateway.    | 
      
PSC_CONNECTION_NOT_ACCEPTED | 
        The Private Service Connect endpoint is in a project that is not approved to connect to the service.    | 
      
PSC_CONNECTION_NOT_ACCEPTED_VALUE | 
        The Private Service Connect endpoint is in a project that is not approved to connect to the service.    | 
      
PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK | 
        The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.    | 
      
PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK_VALUE | 
        The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.    | 
      
PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS | 
        The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.    | 
      
PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS_VALUE | 
        The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.    | 
      
PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS | 
        The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.    | 
      
PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS_VALUE | 
        The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.    | 
      
PSC_PORT_MAPPING_PORT_MISMATCH | 
        Packet is sent to the PSC port mapping service, but its destination port does not match any port mapping rules.    | 
      
PSC_PORT_MAPPING_PORT_MISMATCH_VALUE | 
        Packet is sent to the PSC port mapping service, but its destination port does not match any port mapping rules.    | 
      
PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED | 
        Sending packets directly to the PSC port mapping service without going through the PSC connection is not supported.    | 
      
PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED_VALUE | 
        Sending packets directly to the PSC port mapping service without going through the PSC connection is not supported.    | 
      
PSC_TRANSITIVITY_NOT_PROPAGATED | 
        PSC endpoint is accessed via NCC, but PSC transitivity configuration is not yet propagated.    | 
      
PSC_TRANSITIVITY_NOT_PROPAGATED_VALUE | 
        PSC endpoint is accessed via NCC, but PSC transitivity configuration is not yet propagated.    | 
      
PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION | 
        Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.    | 
      
PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION_VALUE | 
        Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.    | 
      
PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION | 
        Packet sent from a public GKE cluster control plane to a private IP address.    | 
      
PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION_VALUE | 
        Packet sent from a public GKE cluster control plane to a private IP address.    | 
      
REDIS_CLUSTER_NOT_RUNNING | 
        Packet sent from or to a Redis Cluster that is not in running state.    | 
      
REDIS_CLUSTER_NOT_RUNNING_VALUE | 
        Packet sent from or to a Redis Cluster that is not in running state.    | 
      
REDIS_CLUSTER_NO_EXTERNAL_IP | 
        Redis Cluster does not have an external IP address.    | 
      
REDIS_CLUSTER_NO_EXTERNAL_IP_VALUE | 
        Redis Cluster does not have an external IP address.    | 
      
REDIS_CLUSTER_UNSUPPORTED_PORT | 
        Packet is dropped due to an unsupported port being used to connect to a Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to a Redis Cluster.    | 
      
REDIS_CLUSTER_UNSUPPORTED_PORT_VALUE | 
        Packet is dropped due to an unsupported port being used to connect to a Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to a Redis Cluster.    | 
      
REDIS_CLUSTER_UNSUPPORTED_PROTOCOL | 
        Packet is dropped due to an unsupported protocol being used to connect to a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.    | 
      
REDIS_CLUSTER_UNSUPPORTED_PROTOCOL_VALUE | 
        Packet is dropped due to an unsupported protocol being used to connect to a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.    | 
      
REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS | 
        Packet is dropped due to connecting from PUPI address to a PSA based Redis Instance.    | 
      
REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS_VALUE | 
        Packet is dropped due to connecting from PUPI address to a PSA based Redis Instance.    | 
      
REDIS_INSTANCE_NOT_RUNNING | 
        Packet sent from or to a Redis Instance that is not in running state.    | 
      
REDIS_INSTANCE_NOT_RUNNING_VALUE | 
        Packet sent from or to a Redis Instance that is not in running state.    | 
      
REDIS_INSTANCE_NO_EXTERNAL_IP | 
        Redis Instance does not have an external IP address.    | 
      
REDIS_INSTANCE_NO_EXTERNAL_IP_VALUE | 
        Redis Instance does not have an external IP address.    | 
      
REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK | 
        Packet is dropped due to no route to the destination network.    | 
      
REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK_VALUE | 
        Packet is dropped due to no route to the destination network.    | 
      
REDIS_INSTANCE_UNSUPPORTED_PORT | 
        Packet is dropped due to an unsupported port being used to connect to a Redis Instance. Port 6379 should be used to connect to a Redis Instance.    | 
      
REDIS_INSTANCE_UNSUPPORTED_PORT_VALUE | 
        Packet is dropped due to an unsupported port being used to connect to a Redis Instance. Port 6379 should be used to connect to a Redis Instance.    | 
      
REDIS_INSTANCE_UNSUPPORTED_PROTOCOL | 
        Packet is dropped due to an unsupported protocol being used to connect to a Redis Instance. Only TCP connections are accepted by a Redis Instance.    | 
      
REDIS_INSTANCE_UNSUPPORTED_PROTOCOL_VALUE | 
        Packet is dropped due to an unsupported protocol being used to connect to a Redis Instance. Only TCP connections are accepted by a Redis Instance.    | 
      
ROUTE_BLACKHOLE | 
        Dropped due to invalid route. Route's next hop is a blackhole.    | 
      
ROUTE_BLACKHOLE_VALUE | 
        Dropped due to invalid route. Route's next hop is a blackhole.    | 
      
ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH | 
        Route's next hop forwarding rule doesn't match next hop IP address.    | 
      
ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH_VALUE | 
        Route's next hop forwarding rule doesn't match next hop IP address.    | 
      
ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID | 
        Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).    | 
      
ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID_VALUE | 
        Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).    | 
      
ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP | 
        Route's next hop IP address is not a primary IP address of the next hop instance.    | 
      
ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP_VALUE | 
        Route's next hop IP address is not a primary IP address of the next hop instance.    | 
      
ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK | 
        Route's next hop instance doesn't have a NIC in the route's network.    | 
      
ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK_VALUE | 
        Route's next hop instance doesn't have a NIC in the route's network.    | 
      
ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED | 
        Route's next hop IP address cannot be resolved to a GCP resource.    | 
      
ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED_VALUE | 
        Route's next hop IP address cannot be resolved to a GCP resource.    | 
      
ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND | 
        Route's next hop resource is not found.    | 
      
ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND_VALUE | 
        Route's next hop resource is not found.    | 
      
ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED | 
        Route's next hop VPN tunnel is down (does not have valid IKE SAs).    | 
      
ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED_VALUE | 
        Route's next hop VPN tunnel is down (does not have valid IKE SAs).    | 
      
ROUTE_WRONG_NETWORK | 
        Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.    | 
      
ROUTE_WRONG_NETWORK_VALUE | 
        Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.    | 
      
ROUTING_LOOP | 
        Packet is stuck in a routing loop.    | 
      
ROUTING_LOOP_VALUE | 
        Packet is stuck in a routing loop.    | 
      
TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED | 
        Packet could be dropped because hybrid endpoint like a VPN gateway or Interconnect is not allowed to send traffic to the Internet.    | 
      
TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED_VALUE | 
        Packet could be dropped because hybrid endpoint like a VPN gateway or Interconnect is not allowed to send traffic to the Internet.    | 
      
TRAFFIC_TYPE_BLOCKED | 
        The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.    | 
      
TRAFFIC_TYPE_BLOCKED_VALUE | 
        The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.    | 
      
UNKNOWN_EXTERNAL_ADDRESS | 
        Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.    | 
      
UNKNOWN_EXTERNAL_ADDRESS_VALUE | 
        Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.    | 
      
UNKNOWN_INTERNAL_ADDRESS | 
        Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.    | 
      
UNKNOWN_INTERNAL_ADDRESS_VALUE | 
        Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.    | 
      
UNRECOGNIZED | 
        |
UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION | 
        Packet with destination IP address within the reserved NAT64 range is dropped due to matching a route of an unsupported type.    | 
      
UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION_VALUE | 
        Packet with destination IP address within the reserved NAT64 range is dropped due to matching a route of an unsupported type.    | 
      
VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED | 
        Packet could be dropped because the health check traffic to the VPC connector is not allowed.    | 
      
VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED_VALUE | 
        Packet could be dropped because the health check traffic to the VPC connector is not allowed.    | 
      
VPC_CONNECTOR_NOT_RUNNING | 
        Packet could be dropped because the VPC connector is not in a running state.    | 
      
VPC_CONNECTOR_NOT_RUNNING_VALUE | 
        Packet could be dropped because the VPC connector is not in a running state.    | 
      
VPC_CONNECTOR_NOT_SET | 
        Packet could be dropped because no VPC connector is set.    | 
      
VPC_CONNECTOR_NOT_SET_VALUE | 
        Packet could be dropped because no VPC connector is set.    | 
      
VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED | 
        Packet could be dropped because the traffic from the serverless service to the VPC connector is not allowed.    | 
      
VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED_VALUE | 
        Packet could be dropped because the traffic from the serverless service to the VPC connector is not allowed.    | 
      
VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH | 
        The packet does not match a policy-based VPN tunnel local selector.    | 
      
VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH_VALUE | 
        The packet does not match a policy-based VPN tunnel local selector.    | 
      
VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH | 
        The packet does not match a policy-based VPN tunnel remote selector.    | 
      
VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH_VALUE | 
        The packet does not match a policy-based VPN tunnel remote selector.    | 
      
Static Methods | 
      |
|---|---|
| Name | Description | 
forNumber(int value) | 
        |
getDescriptor() | 
        |
internalGetValueMap() | 
        |
valueOf(Descriptors.EnumValueDescriptor desc) | 
        |
valueOf(int value) | 
        Deprecated. Use #forNumber(int) instead.  | 
      
valueOf(String name) | 
        |
values() | 
        |
Methods | 
      |
|---|---|
| Name | Description | 
getDescriptorForType() | 
        |
getNumber() | 
        |
getValueDescriptor() | 
        |